You are on page 1of 12

For- UPSC / MPPSC

Cyber Security

Cyber security/ electronic protecting internet connected systems such as computers, servers, mobile
information security / devices, electronic systems, networks and data from malicious attacks
information technology security
Cyber technology that includes systems, networks, programs and data
Security security of systems, networks, applications and information.

Cyberspace
Cyberspace interconnected digital technology
term cyberspace By science fiction’ author William Gibson used in 1982 in the short story ‘Burning
Chrome’

History of cyber security


year
1971 first computer worm Creeper was written by Bob Thomas at BBN hat could
move across ARPANET’s network.
1972 Ray Tomlinson, the innovator of email, wrote the program Reaper, which
chased and deleted Creepers.
Reaper was the very first example of checking a malware antivirus software
1987

1987 in the United States, John McAfee founded the McAfee company
1987 first two antivirus utilities were released
Flushot Plus by Ross Greenberg
Anti4us by Erwin Lanting
1988 American computer scientist, Robert Morris, wrote a program for testing the
size of the internet.
The program became the first famous network virus and named as Moris worm
1988 In Germany, Tjark Auerbach founded Avira
2000 IT act
Received the assent of the President on 9th June 2000
The Act came into force on 17th October 2000
2008 IT amendment act
2013 Cyber policy of India
2014 National Cyber Security Coordinator First - Dr. Gulshan Roy

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 1
For- UPSC / MPPSC

Some Famous Cyber Attacks


Rome Laboratory
In 1994, more than a hundred times cyber attacks on computer by unknown crackers in the Rome
laboratory.
TJX CUSTOMER CREDIT CARD DETAILS
In early 2007, American apparel and home goods company TJX announced that it had become the victim of
an unauthorized computer system intrusion.
Stuxnet Attack
In 2010, a computer worm known as Stuxnet ruined nearly a fifth of Iran's nuclear centrifuges.
Global surveillance disclosures
In early 2013, documents provided by Edward Snowden were published by The Washington Post and The
Guardian, highlighting the scale of global surveillance by the NSA.

Target and Home Depot breaches


In 2013 and 2014, a Ukrainian hacker known as Reskator broke into Target Corporation computers in 2013,
stealing approximately 40 million credit cards, and again in 2014 Home Depot computers stealing 53 to 56
million credit cards stolen.
Office of Personnel Management Data Theft
In April 2015, the Office of Personnel Management found that it had been hacked in a data breach a year
earlier, resulting in the theft of approximately 21.5 million personnel records handled by the Office.
Ashley Madison Data Theft
In July 2015, a hacker group known as "Impact Team" successfully breached the extramarital affair website
Ashley Madison which was created by Avid Life Media.
Pegasus Paper Leak
• On 19 July 2021, a consortium of 17 international media organizations published an investigation into a
leaked list of phone numbers from around the world, named as Pegasus Project.
• These numbers are a targeted list of phones allegedly hacked / hacked by Pegasus spyware product sold
by NSO Group, Israel.
Pegasus
• Pegasus is a spyware developed by Israeli company NSO Group
• In October 2021, the Supreme Court appointed an expert committee under the supervision of a retired
Supreme Court judge, RV Raveendran.

Cyber crime
• Cybercrime is a crime that involves a computer and a network. The computer may have been used to
commit a crime, or it could be the target.
• According to NITI Aayog there are four types of cyber crimes
1. Cyber Espionage

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 2
For- UPSC / MPPSC

• The act of obtaining secret information without the permission of the holder through the use of malicious
software, including cracking techniques, Trojan horses and spyware.
2. Cyber Attack
• Any type of offensive maneuver that targets computer information systems infrastructure, computer
networks.
3. Cyber Terrorism
• Terrorist act related to cyber space by using cyber techniques is called cyber terrorism.
4. Cyber War
• The action of a nation-state or its proxy entering another country's computer or network.

Some types of cyber attacks


1. Injection Attack
• It is an attack in which some data is inserted into a web application to manipulate the application and
obtain the required information.
• Structured Query Language (SQL).
2. DNS Spoofing
• DNS spoofing is a type of computer security hacking whereby data is introduced into a DNS resolver's
cache, causing the name server to return a false address, allowing traffic to be routed to the attacker's
computer or to another computer.
3. Session Hijacking
• Web applications create cookies to store state and user sessions.
• By stealing cookies, an attacker can have access to all user data.
4. Phishing/Vishing
• Phishing is a type of Social engineering attack.
• Attempts to steal sensitive information such as login credentials and credit card numbers.
5. Brute force
• It is a type of attack that uses trial and error method.
6. Dictionary Attack
• This type of attack stores a list of commonly used passwords and validates them to obtain the original
password.

6. Denial of Service(DoS/DDoS)
• An attack meant to shut down a machine or network, making it inaccessible to its intended users
11. URLinterpretation
• It is a type of attack where we can change parts of the URL, and a web server can be created which can
deliver web pages for which it is not authorized to browse.

13. Man in the middle attacks

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 3
For- UPSC / MPPSC

• It is a type of attack that allows an attacker to intercept the connection between the client and the server
and act as a bridge between them.
• Due to this, an attacker becomes able to read, insert and modify the data in the intercepted connection.
Malware
• Malware is an abbreviation for malicious software.
• Malware is intrusive software designed to damage and destroy computers and computer systems.
• Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and
ransomware.
1. Virus
• Vital information resource under sieze.
• It is a software program that enters the computer and makes many copies of itself or does the work of
erasing, corrupting or changing the data.
• The first virus to spread on the network was the Creeper developed by Bob Thomas virus which
spread an ARPnet.
• The first virus to spread on computer was Alk Cloner.
• C brain was the first virus to spread on IBM computers.
Major Computer Virus
c-brain
• Considered to be the first computer virus for the IBM Personal Computer (IBM PC)
• Written by Amjad Farooq Alvi and Basit Farooq Alvi, Pakistan.
Crypto Locker (2013)
• Released in September 2013, Cryptolocker spread via email attachments and encrypted user's files so
that they could not access them.
• In June 2014, Evgeny Bogachev, the leader of the hackers behind Cryptolocker, was killed in
Operation Tovar.
ILOVEYOU (2000)
• The virus came in an email with a subject line that said 'I love you.
• Recorded it in the Guinness World Records as the most spreading virus ever.

My Doom (2004)
• My Doom is considered to be the most harmful virus ever.
• The fastest spreading email-based worm ever.

Storm Worm(2006)
• When, people open the email and click on the link of the news and that's when the problems start.
• The storm worm was a Trojan horse that infected computers.

Michel Angelo(1991)

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 4
For- UPSC / MPPSC

• This virus ends data on March 6, which is Michelangelo's date of birth. That's why it is also called
'March 6 virus'.
• Michelangelo is classified as a boot sector virus, a type of virus that infects the startup sectors of
storage devices.
Disk washer
• Sent to India in the last month of 1993.
• This virus was so dangerous that it destroyed all the data available in the hard disk.
Jerusalem
• The virus was first detected around 1987 at Hevro University, Jerusalem.
• It was active only on Fridays.
Other viruses
• EventBot, Necurs (botnet), Strendhogg, Dride, Agent Smithy, Gravity Rat, Stuxnet, Flame and Dyuke
Kronos, Wanakry (2016).
2. Worms
• It slows down the speed of the computer by making multiple copies of itself and filling the hard disk
space.
• Slows down the speed of data transfer over the Internet using bandwidth.
3. Trojan Horse
• It appears as a warning of useful softwares
• On downloading it, it enters the computer.
• Additionally it opens the way for other malwares (backdoors)
• It makes unexpected changes to computer settings and unusual activity, even when the computer
should be idle.

Eventbot
Mobile banking Trojan horse
Ex. Scareware, Rouge Security Software.
BlackRock
It can steal information from Social media apps like Facebook WhatsApp and e-commerce apps on the
phone.
4. Back door
This is a method that reject the normal authentication process.
5. Bots
• A bot (Robot) is an automated process that interacts with other network services.
• Common examples of bot programs are crawlers, chat room bots, and malicious bots.
Keylogger
• Tools that record what a person types on a device

Wiper
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 5
For- UPSC / MPPSC

• It overwrites on the file


Smising
It receives secret information from the computer by sending messages in it.
Packet Sniffing
Recording packet scores of data sent over a network before it reaches the destination

Adware
They get income by showing advertisements in an unwanted manner.

Ransomware
• It prevents any file from being opened on entering in Computer vote and demanding money.
• Ex. Petya, Wannacry, Bad Rabbit.

Spyware
Its function is to enter a computer and keep an eye on all the activities done in that computer.

Salami technique
• In this, so little is taken out of a large amount of money that it becomes difficult to identify it due to no
special effect on the affected person.
• Like 50 to 60 paise theft in each payment

Rootkits
• A rootkit is a program or set of software tools that secretly allows hackers to access and control a
system.

Bootkit
• Advance Rootkit

Cross-Site Scripting (XSS) attack


Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into
otherwise benign and trusted websites

Vulnerability Scanner
• It allows ethical hackers to find potential flaws and fix them immediately.
• Ex. Nmap (Network mapper), Nessue, Nikto (Scans and test Several web servers for identifying
software that is outdated), Kismet (hacking of wireless LAN wardriving), Netstumbler (Prevent
wardriving).

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 6
For- UPSC / MPPSC

Clickjacking/ User interface (UI) redressing


• An attack that fools users into thinking they are clicking on one thing when they are actually clicking on
another.

Deepfakes
• An audio or video clip that has been edited and manipulated to appear genuine or believable.

Social Engineering
• It is the use of deception to manipulate individuals to breach security.
Logic Bomb
• It is a type of malware added to a legitimate program that remains dormant until it is triggered by a
specific event.
Zero Trust Security
• This means that by default no one is trusted from inside or outside the network, and verification is
required from everyone trying to gain access to resources on the network.

types of hackers
1. Black Hat
➢ A black-hat hacker is a person who attempts to gain unauthorized
access to a system or network for malicious reasons.
➢ They steal or gain access to passwords, financial information and
other personal data.

2. White Hat/ Ethical


➢ White-hat hackers, supposedly good people, work with
organizations to strengthen the security of a system.
➢ White-hat hackers are often called ethical hackers.

3. Grey Hat
➢ Gray hat hackers are in between white and black.
➢ They are people who look for vulnerabilities in systems without
permission but potentially with good intentions.

4. Red Hat
➢ Red Hat is known as the wise man of the hacking world.
➢ They live and act by their own rules
5. Green Hat
➢ Green hat hackers are new hackers and they work every day to
improve their skills so that they can become better.

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 7
For- UPSC / MPPSC

6. Blue Hat
➢ Blue hat hackers are security professionals who are outside organizations.
➢ A security professional invited by Microsoft to find vulnerabilities in Windows.
7. Phreakers
➢ The people who broke into the telephone system were called Phreakers.
8. Script Kiddie
➢ A person who uses existing computer scripts or code to hack a computer that lacks the expertise to write
one's own.
9. Hacktivist
Hacktivism is the use of hacking to promote a political agenda or social change.

Some important security techniques used in cyber security


firewall
• Firewalls are used to prevent unauthorized Internet users from accessing private networks connected to
the Internet.
• It can be implemented as hardware, software or a combination of both.
• All messages entering or leaving the intranet pass through the firewall.
• Firewall checks each message and blocks messages that do not have specified security criteria.

VPNs
• VPN stands for Virtual Private Network.
• It is a technology that creates a secure and encrypted connection from a device across a network to the
Internet.
• All cloud service and VPN providers to maintain a series of extensive customer information for at
• least five years
Intrusion Detection System (IDS)
• IDS is a security system that monitors computer systems and network communications.

Firewall
• Firewall works to filter the traffic coming from the Internet, similarly, it strengthens security.

Digital signature
• An electronic, encrypted, stamp of authentication on digital information such as email messages, macros,
or electronic documents.
• A signature confirms that the information originated from the signer and has not been altered.

Honey spots
• These are computers that are intentionally left vulnerable to attack by crackers.
• They are used to capture crackers and identify their techniques.

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 8
For- UPSC / MPPSC

Instruction Recognition Mechanism


• These are tools or software applications that monitor networks or systems for malicious activity or
policy violations.

Antivirus
• Antivirus is a software utility program designed to protect the system from internal attacks from
viruses, Trojan horses, spyware, etc.
• First antivirus was Reeper developed by Ray tamilson.
• Major Antivirus- . A Vast, Bitdefender, AVG, Mcfee, Norton, Normal, Panda, Net protector, ViRobot,
Defender, K-7, PC Protector Quik heal etc.

Cyber security measures in india

PM OFFICE/CAB National Security Council (NSC)


INET SECY National Technical Research Org. (NTRO)
(PMO/CAB SEC) National Critical Info Infrastructure Protection Centre (NCIIPC)
National Crisis Management Committee (NCMC)
Research & Analysis Wing (RAW)
National Information Board (NIB)
Multi Agency Center
MINISTERY OF National Cyber Coordinance Centre (NCCC)
HOME AFFAIRS Directorate of Forensic Science (DFS)
(MHA) National Disaster Mgt Authority (NDMA)
Central Forensic Science Labs (CFSLs)
Intelligence Bureau (IB)
MINISTRY OF Defence Attaches
EXTERNAL AFFAIRS
(MEA)
MINISTRY OF Tri Service Cyber Commad
DEFENCE (MOD) Def Info Assurance & Research Agency (DIARA)
Defence Intelligence Agency (DIA)
Defence Research Dev Authority (DRDO)
MEITY Indian Computer Emergency Response Team (CERTIN)
Educational Research Network (ERNET)
National Informatics Center (NIC)
Centre for Development of Advanced Computing (C-DAC)
Standardisation, Testing and Quality Certification (STQC)
NON GOVT Cyber Security And Anti Hacking Organisation (CSAHO)
ORGANIZATION Cyber Society of India (CySI)

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 9
For- UPSC / MPPSC

(NGO) Centre of Excellence for Cyber Security Research & Development in India
(CECSRDI)
Cyber Security of India (CSI)
National Cyber Security of India (NCS)
Cyber Attacks Crisis Management Plan of India (CACMP)

Organisations under PMO


1. National Security Council (NSC)
2. National Information Board
• The National Security Council and National Information Board headed by National Security Adviser are
at working under the cyber security surveillance helping in framing India’s cyber security policy.

3. National Technical Research Org. (NTRO)


• It was set up in 2004
• NTRO, along with IAF operates a number of Very Long Range Tracking Radar (VLRTR) systems

4. National Critical Info Infrastructure Protection Centre (NCIIPC)


• Created under the Section 70A of the Information Technology Act, 2000 (amended 2008), through
a gazette notification on 16 January 2014.
• It is a unit of the National Technical Research Organisation (NTRO)

Organisations under Home ministry

1. National Cyber Security Coordinator (NCSC)


• working under National Security Council Secretariat (NSCS)

2. Indian Cyber Crime Co-Ordination Center (I4C)


• established in 2018
• under Ministry of Home affairs (MHA) to act as a nodal point at National level in the fight against
cybercrime.

3. The National Cyber Crime Reporting Portal


4. Start in 2019
• As a part of the I4C
• provide early stage cyber forensic assistance to Investigating Officers (IOs) of State/UT Police.
• Helpline no - 1930

Ministry of Electronics and Information Technology


Indian Computer Emergency Response Team (CERT-in or ICERT)
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 10
For- UPSC / MPPSC


Establishment 2004
Headquarter New Delhhi
Principles Dealing with Cyber Security Incidents
CEO Sanjay Behl, Director General
Parental Department Ministry of Electronics and Information Technology

Cyber Swachhta Kendra


• The Cyber Swachhta Kendra (Botnet Cleanup and Malware Analysis Center) is a part of the Digital
India initiative of the Government of India under the Ministry of Electronics and Information
Technology.
• This center is being operated by the Indian Computer Emergency Response Team (CERT-In) under the
provisions of Section 70B of the Information Technology Act, 2000.

Information Technology Act, 2000


• Assent of President – 9 May 2000
• Enforced – 17 October 2000
• Amendment in 2008 - Section 66A deals with information related offenses in which sending any
abusive or illegal and dangerous information through computer resource of communication equipment
is a punishable offence.
• Abolition of section 66A of the IT Act in Shreya Singhal vs Union of India 2015 (by Supreme Court)
2015.

National Cyber Security Policy, 2013


• Under this, there is also a provision for imprisonment of 2 years to life or fine.
• CERT-In has been designated as the National Nodal Agency for coordinating issues relating to cyber
security matters.

Cyber Protected India


• The Cyber Safe India initiative was announced by the Ministry of Electronics and Information
Technology in association with the National e-Government Division Industry.
• First PPP initiative for cyber security
• Started – 19th January 2018

Budapest Convention on Cyber Crime, 2001


• The Council of Europe's (CoE) Cybercrime Convention, also known as the Budapest Convention, is the
only legally binding international multilateral treaty on cybercrime.
• It was open for signature in 2001 and came into force in 2004.
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 11
For- UPSC / MPPSC

• Protocol on xenophobia and racism carried out through computer systems.


• India is not a party to it.
• India recently voted in favor of a Russian-led UN resolution to set up a separate convention.

Note
• Right to privacy has been recognized as one of the fundamental rights by the Supreme Court in KS
Puttaswamy case, 2017.

Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 12

You might also like